Roland Rieke

Orcid: 0000-0003-3461-0520

According to our database1, Roland Rieke authored at least 42 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet.
ACM Comput. Surv., June, 2024

2023
RulEth: Genetic Programming-Driven Derivation of Security Rules for Automotive Ethernet.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

2022
ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering.
Microprocess. Microsystems, April, 2022

CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem.
Proceedings of the IEEE International Conference on Trust, 2022

SECPAT: Security Patterns for Resilient Automotive E / E Architectures.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

2021
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants.
Simul. Model. Pract. Theory, 2021

Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

In-vehicle detection of targeted CAN bus attacks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models.
Simul. Model. Pract. Theory, 2020

SEPAD - Security Evaluation Platform for Autonomous Driving.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

2019
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust Anchors.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
Behavior Analysis for Safety and Security in Automotive Systems.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

2015
Security Analysis of System Behaviour - From "Security by Design" to "Security at Runtime" -.
PhD thesis, 2015

Security Compliance Tracking of Processes in Networked Cooperating Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Pairs of Languages Closed under Shuffle Projection.
CoRR, 2015

Trust Establishment in Cooperating Cyber-Physical Systems.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Security and Business Situational Awareness.
Proceedings of the Cyber Security and Privacy, 2015

2014
An update logic for information systems.
Int. J. Approx. Reason., 2014

Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Monitoring Security Compliance of Critical Processes.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

No Smurfs: Revealing Fraud Chains in Mobile Money Transfers.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Challenges for Advanced Security Monitoring - The MASSIF Project.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Security Requirements for Uniformly Parameterised Cooperations.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Architecting a security strategy measurement and management system.
Proceedings of the Model-Driven Security Workshop, 2012

Model-Based Security Event Management.
Proceedings of the Computer Network Security, 2012

Security and Reliability Requirements for Advanced Security Event Management.
Proceedings of the Computer Network Security, 2012

2011
Security Properties of Self-Similar Uniformly Parameterised Systems of Cooperations.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

MASSIF: A Promising Solution to Enhance Olympic Games IT Security.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
Predictive Security Analysis for Event-Driven Processes.
Proceedings of the Computer Network Security, 2010

Secure Mobile Business Information Processing.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Identification of Security Requirements in Systems of Systems by Functional Security Analysis.
Proceedings of the Architecting Dependable Systems VII, 2009

2008
Abstraction-based analysis of known and unknown vulnerabilities of critical information infrastructures.
Int. J. Syst. Syst. Eng., 2008

2006
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Modelling and Analysing Network Security Policies in a Given Vulnerability Setting.
Proceedings of the Critical Information Infrastructures Security, 2006

2000
Abstraction and composition: a verification method for co-operating systems.
J. Exp. Theor. Artif. Intell., 2000

Verification of Cooperating Systems - An Approach Based on Formal Languages.
Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, 2000

The SH-Verification Tool.
Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, 2000

1998
The SH-Verification Tool - Abstraction-Based Verification of Co-operating Systems.
Formal Aspects Comput., 1998


  Loading...